Show simple item record

dc.contributor.authorSu, Weilian
dc.contributor.authorTien, Too Huseh
dc.contributor.authorHa, Tri
dc.date24 July 2017
dc.date.accessioned2018-12-10T16:20:56Z
dc.date.available2018-12-10T16:20:56Z
dc.date.issued2017
dc.identifier.citationSu, Weilian, Too Huseh Tien, and Tri Ha. "Power Control Weakness in Long Term Evolution Network." Cyber Security and Cloud Computing (CSCloud), 2017 IEEE 4th International Conference on. IEEE, 2017.en_US
dc.identifier.urihttp://hdl.handle.net/10945/60776
dc.descriptionThe article of record as published may be found at http://dx.doi.org/10.1109/CSCloud.2017.33en_US
dc.descriptionPublished in: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)
dc.description.abstractThe increasingly important role of Long Term Evolution (LTE) has increased security concerns among the service provider and end users and made security of the network even more indispensable. In this paper, the power control mechanism for LTE is explored. The unprotected power control signal together with the Cell Radio Network Temporary Identifier (CRNTI) can be exploited to trick the victim User Equipment (UE) to transmit at a much higher than required power, which introduces significant inter-cell interference to the adjacent based station, evolved NodeB (eNodeB). The ways that an attacker can maliciously manipulate the control field of the power control mechanism are demonstrated. The effectiveness of such attack is evaluated with respect to the victim UEs and the adjacent eNodeB.en_US
dc.format.extent7 p.en_US
dc.publisherIEEEen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titlePower Control Weakness in Long Term Evolution Networken_US
dc.typeArticleen_US
dc.contributor.corporateNaval Postgraduate School (U.S.)en_US
dc.contributor.departmentElectrical and Computer Engineering (ECE)
dc.subject.authorLTEen_US
dc.subject.authorPower Controlen_US
dc.subject.authorWeaknessen_US
dc.subject.authorExploitationen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record